
via Sécurité publique Canada
Army researchers developed a new machine learning-based framework to enhance the security of computer networks inside vehicles without undermining performance.
With the widespread prevalence of modern automobiles that entrust control to onboard computers, this research looks toward to a larger Army effort to invest in greater cybersecurity protection measures for its aerial and land platforms, especially heavy vehicles.
In collaboration with an international team of experts from Virginia Tech, the University of Queensland and Gwangju Institute of Science and Technology, researchers at the U.S. Army Combat Capabilities Development Command, known as DEVCOM, Army Research Laboratory devised a technique called DESOLATOR to help optimize a well-known cybersecurity strategy known as the moving target defense.
“The idea is that it’s hard to hit a moving target,” said Dr. Terrence Moore, Army mathematician. “If everything is static, the adversary can take their time looking at everything and choosing their targets. But if you shuffle the IP addresses fast enough, then the information assigned to the IP quickly becomes lost, and the adversary has to look for it again.”
DESOLATOR, which stands for deep reinforcement learning-based resource allocation and moving target defense deployment framework, helps the in-vehicle network identify the optimal IP shuffling frequency and bandwidth allocation to deliver effective, long-term moving target defense.
According to Army computer scientist and program lead Dr. Frederica Free-Nelson, achievement of the former keeps uncertainty high enough to thwart potential attackers without it becoming too costly to maintain, while attainment of the latter prevents slowdowns in critical areas of the network with high priority.
“This level of fortification of prioritized assets on a network is an integral component for any kind of network protection,” Nelson said. “The technology facilitates a lightweight protection whereby fewer resources are used for maximized protection. The utility of fewer resources to protect mission systems and connected devices in vehicles while maintaining the same quality of service is an added benefit.”
The research team used deep reinforcement learning to gradually shape the behavior of the algorithm based on various reward functions, such as exposure time and the number of dropped packets, to ensure that DESOLATOR took both security and efficiency into equal consideration.
“Existing legacy in-vehicle networks are very efficient, but they weren’t really designed with security in mind,” Moore said. “Nowadays, there’s a lot of research out there that looks solely at either enhancing performance or enhancing security. Looking at both performance and security is in itself a little rare, especially for in-vehicle networks.”
In addition, DESOLATOR is not limited to identifying the optimal IP shuffling frequency and bandwidth allocation. Since this approach exists as a machine learning-based framework, other researchers can modify the technique to pursue different goals within the problem space.
“This ability to retool the technology is very valuable not only for extending the research but also marrying the capability to other cyber capabilities for optimal cybersecurity protection,” Nelson said.
Researchers detail information about their approach in the research paper, DESOLATER: Deep Reinforcement Learning-Based Resource Allocation and Moving Target Defense Deployment Framework, in the peer-reviewed journal IEEE Access.
Original Article: New cybersecurity technique keeps hackers guessing
More from: United States Army Research Laboratory | Virginia Polytechnic Institute and State University | University of Queensland | Gwangju Institute of Science and Technology
The Latest Updates from Bing News & Google News
Go deeper with Bing News on:
Cybersecurity protection for vehicles
- Your Biggest Cybersecurity Threat Is Something You’ve Never Heard Of
Here’s why API security matters and what every company should do this year to protect their customers’ valuable data and trust.
- CrowdStrike Invests in Abnormal Security and Launches New
CrowdStrike (NASDAQ: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced that its strategic investment vehicle ... largest corporate venture ...
- Encryption is the cybersecurity cornerstone and time to act is now: Senetas boss
And 2023 is shaping to be a once-in-a-lifetime opportunity for the industry, according to Senetas CEO Andrew Wilson. Here he explains where we are, and where we should be: Just like the insurance ...
- Industry insights on long-term software support, PII protection
A recent Ars Technica article on the subject of “lifetime” in-vehicle software updates begs another tech concern for repairers and consumers — what happens to the data that’s ...
- Encryption is the Cybersecurity Cornerstone
Special Report: 2022 was the year the Australian government, citizens and cybersecurity regulators finally got angry about the shocking state ... Read More The post Encryption is the Cybersecurity ...
Go deeper with Google Headlines on:
Cybersecurity protection for vehicles
[google_news title=”” keyword=”cybersecurity protection for vehicles” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]
Go deeper with Bing News on:
Network protection
- Sky Mavis brings 4 new blockchain games to its Ronin network
Sky Mavis, the creator of Axie Infinity, is preparing to launch a new batch of Web3 games on its Ronin network.
- South Africa power cuts, vandalism, theft prompt MTN security moves
Rolling power cuts, vandalism and battery theft have forced MTN Group's South African arm to invest 1.5 billion rand ($84 million) to ensure its mobile network operates effectively.South African state ...
- Europe Cyber Security Market Report 2023: Players Include Palo Alto Networks, Microsoft, F5 Network, Accenture and Cognizant Technology
Dublin, March 30, 2023 (GLOBE NEWSWIRE) -- The "Europe Cyber Security Market, Size, Forecast 2023-2028, Industry Trends, Growth, Impact of Inflation, Opportunity Company Analysis" report has been ...
- SecurityGen highlights cyber-security risks and solutions for 5G network slicing to mobile operators and enterprises
As 5G network slicing gains momentum, operators and businesses need to factor cyber-security into their plans for the technology "Successful network slicing relies on honesty and transparency between ...
- Network Security Policy Management Market Trends, Industry Demand and Scope, Top Players Analysis, Forecast 2023 - 2031
Pages with Synopsis] COVID-19 Impact, Despite Inflation and Fearing Recession, Businesses Across the Globe Expected to Do Better in 2023 Top “Network Security Policy Management Market” Size 2023 Key ...
Go deeper with Google Headlines on:
Network protection
[google_news title=”” keyword=”network protection” num_posts=”5″ blurb_length=”0″ show_thumb=”left”]